AntivirusPassPhaseSecurePasswordIdentifyTwo-FactorAuthenticationLeastPrivilegePhishingRecoverRespondVPNSecureEmailSpearPhishingSecurityAwarenessTrainingPatchManagementAdvancedPersistentThreatAssetManagementSSLDecryptMalwareFirewallProtectDataDiscoveryDetectRiskAssessmentTypesofHackersAntivirusPassPhaseSecurePasswordIdentifyTwo-FactorAuthenticationLeastPrivilegePhishingRecoverRespondVPNSecureEmailSpearPhishingSecurityAwarenessTrainingPatchManagementAdvancedPersistentThreatAssetManagementSSLDecryptMalwareFirewallProtectDataDiscoveryDetectRiskAssessmentTypesofHackers

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Antivirus
  2. PassPhase
  3. Secure Password
  4. Identify
  5. Two-Factor Authentication
  6. Least Privilege
  7. Phishing
  8. Recover
  9. Respond
  10. VPN
  11. Secure Email
  12. Spear Phishing
  13. Security Awareness Training
  14. Patch Management
  15. Advanced Persistent Threat
  16. Asset Management
  17. SSL Decrypt
  18. Malware
  19. Firewall
  20. Protect
  21. Data Discovery
  22. Detect
  23. Risk Assessment
  24. Types of Hackers